SlideShare une entreprise Scribd logo
1  sur  22
Physical Security
Presented by,
Gouriswar Koppada
Director
JUPITER GROUP OF COMPANIES
Security Ethics
Security Officer/Supervisor shall:
Exhibit exemplary conduct,
Respond to employee professional needs,
Develop good rapport within the profession,
Encourage high standard of officer ethics,
Protect Confidential Information,
Strive to attain professional competence,
Maintain safe and secure work place,
Dress to create professionalism & enforce all lawful
rules and regulations,
What is physical security
Physical Security describes security measures that are
designed to deny access to unauthorized personnel
(including attackers or even accidental intruders) from
physically accessing a building, facility, resource, or stored
information; and guidance on how to design structures to
resist potentially hostile acts. Physical security can be as
simple as a locked door or as elaborate as multiple layers of
barriers, armed security guards and gate-house placement.
Introduction
The goal of physical security is to provide a safe
environment for all assets and interests of the
organization like regulate the entry for men and
materials.
Physical security provides protection for the HO
/CORP/Factory buildings, other building structures,
a vehicle housing the system, and/or other business
locations..
Threats to Physical Environment
 Natural/Environmental
 Earthquakes, floods, storms, natural fires, extreme temperatures,
high humidity, building collapse.
 Supply systems:
 Communication outage, power distribution, burst pipes.
 Man-Made
 Explosions, disgruntled employees, unauthorized access, employee
errors, sabotage, chemical contamination, Vandalism and theft,
intruders, unintentional acts. bombings, terrorist attacks, espionage,
civil disturbances, strikes.
Note: Suggested for strong Crisis Management Team.
Use of available resources
Plan and deploy equipment as per site requirement.
Check and report suitability of equipment and
guards for particular duties.
Anticipate risk/threats and take corrective action.
Periodically check the operational fitness of security
equipment
Proper duty roster of shift and give duties to guard as
assigned work.
Use of available resources continued:
Deploy guard with required equipments in required
site location.
Make procedure to collect intelligence and
information.
Command and control guard duties and functioning.
Maintain key control ,personal control for unit.
Security deployment
Security deployment
Duties and responsibilities of security guard
To be clearly visible
To respond quickly and correctly during crisis
Observing and reporting
Maintain order among people
Receiving guests
Offer safety warnings and tips
Information Protection Environment
A layered defense model
COMP4690, HKBU
10
Perimeter
Building Grounds
Building Entrance
Building Floors/Office Suites
Offices/Data Centers
Equipment/Supplies, Media
Organizational structure
The organization of security department include the
chain of command hierarchy from Executive to
front line
The purpose of this section is to make clear who
reports to whom and who has which responsibility.
This give clear understanding of the duties and the
responsibilities along with all answers regarding
what are the limitation within the position and line
authority, responsibilities and accountability.
Security Technology and Tools
Walls, Fencing, and Gates
Guards
ID Cards and Badges
Locks and Keys
CCTV Monitoring
Fire Alarms Systems
Access Control System
Locks and Keys
Two types of locks: mechanical and electro
mechanical
Locks can also be divided into four categories:
manual, programmable, electronic, bio metric
Locks fail and alternative procedures for
controlling access must be put in place
Locks fail in one of two ways
 Fail-safe lock
 Fail-secure lock
CCTV Monitoring system
Fire Security and Safety
Most serious threat to safety of people who work in an
organization is possibility of fire.
Fires account for more property damage, personal injury,
and death than any other threat.
Imperative that physical security plans examine and
implement strong measures to detect and respond to fires
Types of Fire
 Types of Fire:
 A: Common Combustibles
 Elements: Wood products, paper, laminates
 Suppression: Water, foam
 B: Liquid
 Elements: Petroleum products and coolants
 Suppression: Gas, CO2, foam, dry powders
 C: Electrical
 Elements: Electrical equipment and wires
 Suppression: Gas, CO2, dry powders
 D: Combustible Metals
 Elements: magnesium, sodium, potassium
 Suppression: Dry powder
Different Types of Suppression Agents
 Water
 Foams
 Dry Powders
 CO2
 Soda Acid
Fire Extinguishers
Fire Suppression Training
Summary
Threats to information security that are unique to
physical security
Key physical security considerations in a facility site
Physical security monitoring components
Essential elements of access control
Fire safety, fire detection, and response
Importance of supporting utilities, especially use of
uninterrupted power supplies
Countermeasures to physical theft of computing
devices
THANK
YOU
JUPITER GROUP OF COMPANIES

Contenu connexe

Tendances

Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityDr. Lasantha Ranwala
 
Practical Application of Physical Security Criteria
Practical Application of Physical Security CriteriaPractical Application of Physical Security Criteria
Practical Application of Physical Security CriteriaScott L Weiland PE
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk managementDr. Lasantha Ranwala
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Tonex
 
Chapter 2 phisycal security threat
Chapter 2   phisycal security threatChapter 2   phisycal security threat
Chapter 2 phisycal security threatSyaiful Ahdan
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)GAURAV. H .TANDON
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 

Tendances (19)

Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
Practical Application of Physical Security Criteria
Practical Application of Physical Security CriteriaPractical Application of Physical Security Criteria
Practical Application of Physical Security Criteria
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Chapter 2 phisycal security threat
Chapter 2   phisycal security threatChapter 2   phisycal security threat
Chapter 2 phisycal security threat
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 

En vedette

NAP Expo 2015 Session IX Flood risks in a changing climate
NAP Expo 2015 Session IX Flood risks in a changing climate NAP Expo 2015 Session IX Flood risks in a changing climate
NAP Expo 2015 Session IX Flood risks in a changing climate NAP Events
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging ThreatsLumension
 
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Joshua S. White, PhD josh@securemind.org
 
Security MEGA PRojects
Security MEGA PRojectsSecurity MEGA PRojects
Security MEGA PRojectsWasef Al-Hakim
 
Wcdma physical layer
Wcdma physical layerWcdma physical layer
Wcdma physical layerrajibratan
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical LayerSachii Dosti
 
Lecture3 Physical Layer
Lecture3 Physical LayerLecture3 Physical Layer
Lecture3 Physical LayerWaqas !!!!
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
The Case of SAFE and Smart cities
The Case of SAFE and Smart cities The Case of SAFE and Smart cities
The Case of SAFE and Smart cities PlanetInspired
 
Event infrastructure
Event infrastructure Event infrastructure
Event infrastructure M. C.
 

En vedette (20)

NAP Expo 2015 Session IX Flood risks in a changing climate
NAP Expo 2015 Session IX Flood risks in a changing climate NAP Expo 2015 Session IX Flood risks in a changing climate
NAP Expo 2015 Session IX Flood risks in a changing climate
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Mega Events- מכון היצוא
Mega Events- מכון היצוא Mega Events- מכון היצוא
Mega Events- מכון היצוא
 
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
 
Event management
Event managementEvent management
Event management
 
Security MEGA PRojects
Security MEGA PRojectsSecurity MEGA PRojects
Security MEGA PRojects
 
מצגת ערים חכמות
מצגת ערים חכמות מצגת ערים חכמות
מצגת ערים חכמות
 
T20 World Cup 2012 Android Apps
T20 World Cup 2012 Android AppsT20 World Cup 2012 Android Apps
T20 World Cup 2012 Android Apps
 
Mega event managemnt
Mega event managemntMega event managemnt
Mega event managemnt
 
Wcdma physical layer
Wcdma physical layerWcdma physical layer
Wcdma physical layer
 
Safe City 1.0
Safe City 1.0Safe City 1.0
Safe City 1.0
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Lecture3 Physical Layer
Lecture3 Physical LayerLecture3 Physical Layer
Lecture3 Physical Layer
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Hotel security
Hotel securityHotel security
Hotel security
 
The Case of SAFE and Smart cities
The Case of SAFE and Smart cities The Case of SAFE and Smart cities
The Case of SAFE and Smart cities
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Event infrastructure
Event infrastructure Event infrastructure
Event infrastructure
 

Similaire à Jupiter physical security ppt 2016 1

Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newMaxpromotion
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to SecurityNateBrown60
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.pptssuserb680dd
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxcherishwinsland
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...kris harden
 
Top 20 must-Have Industrial Safety Equipment for Every Workplace
Top 20 must-Have Industrial Safety Equipment for Every WorkplaceTop 20 must-Have Industrial Safety Equipment for Every Workplace
Top 20 must-Have Industrial Safety Equipment for Every Workplaceshriyaglobalinfo
 
Top 20 Must-Have Industrial Safety Equipment for Every Workplace
Top 20 Must-Have Industrial Safety Equipment for Every WorkplaceTop 20 Must-Have Industrial Safety Equipment for Every Workplace
Top 20 Must-Have Industrial Safety Equipment for Every Workplaceshriyaglobalinfo
 
Revolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdf
Revolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdfRevolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdf
Revolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdfcharlie65miller
 
Introduction Safety and hazard management
Introduction Safety and hazard managementIntroduction Safety and hazard management
Introduction Safety and hazard managementAregahegnMelkea1
 

Similaire à Jupiter physical security ppt 2016 1 (20)

Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
Jupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 newJupiter physical security ppt 2016 new
Jupiter physical security ppt 2016 new
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Introduction to Security
Introduction to SecurityIntroduction to Security
Introduction to Security
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
 
PPE
PPEPPE
PPE
 
Top 20 must-Have Industrial Safety Equipment for Every Workplace
Top 20 must-Have Industrial Safety Equipment for Every WorkplaceTop 20 must-Have Industrial Safety Equipment for Every Workplace
Top 20 must-Have Industrial Safety Equipment for Every Workplace
 
Top 20 Must-Have Industrial Safety Equipment for Every Workplace
Top 20 Must-Have Industrial Safety Equipment for Every WorkplaceTop 20 Must-Have Industrial Safety Equipment for Every Workplace
Top 20 Must-Have Industrial Safety Equipment for Every Workplace
 
CHAP 8..ppt
CHAP 8..pptCHAP 8..ppt
CHAP 8..ppt
 
Revolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdf
Revolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdfRevolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdf
Revolutionizing Workplace Safety_ The Role of Body Protection Equipment.pdf
 
Introduction Safety and hazard management
Introduction Safety and hazard managementIntroduction Safety and hazard management
Introduction Safety and hazard management
 

Plus de Maxpromotion

SURAJ VASTU A project by Suraj Builder
SURAJ VASTU A project by Suraj BuilderSURAJ VASTU A project by Suraj Builder
SURAJ VASTU A project by Suraj BuilderMaxpromotion
 
International Yoga Day Kunjir Public School
International Yoga Day Kunjir Public SchoolInternational Yoga Day Kunjir Public School
International Yoga Day Kunjir Public SchoolMaxpromotion
 
QRICS CALIBRATION LABORATORIES PVT LTD
QRICS CALIBRATION LABORATORIES PVT LTDQRICS CALIBRATION LABORATORIES PVT LTD
QRICS CALIBRATION LABORATORIES PVT LTDMaxpromotion
 
Migrow Agro Product Catlog
Migrow Agro Product CatlogMigrow Agro Product Catlog
Migrow Agro Product CatlogMaxpromotion
 
Sri Balajee Industrial Constructions Pvt. Ltd.
Sri Balajee Industrial Constructions Pvt. Ltd. Sri Balajee Industrial Constructions Pvt. Ltd.
Sri Balajee Industrial Constructions Pvt. Ltd. Maxpromotion
 
Riyaraj Group Of Industries Price List
Riyaraj Group Of Industries Price ListRiyaraj Group Of Industries Price List
Riyaraj Group Of Industries Price ListMaxpromotion
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student PortfolioMaxpromotion
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student PortfolioMaxpromotion
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student PortfolioMaxpromotion
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student PortfolioMaxpromotion
 
Onyx sales and services pune Broucher
Onyx sales and services pune BroucherOnyx sales and services pune Broucher
Onyx sales and services pune BroucherMaxpromotion
 
Rambert System Elmex Catlog
Rambert System Elmex CatlogRambert System Elmex Catlog
Rambert System Elmex CatlogMaxpromotion
 
Rambert System Multispan Catlogue
Rambert System Multispan CatlogueRambert System Multispan Catlogue
Rambert System Multispan CatlogueMaxpromotion
 
Jali Designs Vivid Decor
Jali Designs  Vivid DecorJali Designs  Vivid Decor
Jali Designs Vivid DecorMaxpromotion
 
Swaraj Roofing Solutions Catalogue
Swaraj Roofing Solutions CatalogueSwaraj Roofing Solutions Catalogue
Swaraj Roofing Solutions CatalogueMaxpromotion
 
Shweta m. shewalkar
Shweta m. shewalkarShweta m. shewalkar
Shweta m. shewalkarMaxpromotion
 
Manuja sutar folio
Manuja sutar folioManuja sutar folio
Manuja sutar folioMaxpromotion
 

Plus de Maxpromotion (20)

SURAJ VASTU A project by Suraj Builder
SURAJ VASTU A project by Suraj BuilderSURAJ VASTU A project by Suraj Builder
SURAJ VASTU A project by Suraj Builder
 
International Yoga Day Kunjir Public School
International Yoga Day Kunjir Public SchoolInternational Yoga Day Kunjir Public School
International Yoga Day Kunjir Public School
 
Avanitec-Pune.pdf
Avanitec-Pune.pdfAvanitec-Pune.pdf
Avanitec-Pune.pdf
 
QRICS CALIBRATION LABORATORIES PVT LTD
QRICS CALIBRATION LABORATORIES PVT LTDQRICS CALIBRATION LABORATORIES PVT LTD
QRICS CALIBRATION LABORATORIES PVT LTD
 
Migrow Agro Product Catlog
Migrow Agro Product CatlogMigrow Agro Product Catlog
Migrow Agro Product Catlog
 
Sri Balajee Industrial Constructions Pvt. Ltd.
Sri Balajee Industrial Constructions Pvt. Ltd. Sri Balajee Industrial Constructions Pvt. Ltd.
Sri Balajee Industrial Constructions Pvt. Ltd.
 
Riyaraj Group Of Industries Price List
Riyaraj Group Of Industries Price ListRiyaraj Group Of Industries Price List
Riyaraj Group Of Industries Price List
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student Portfolio
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student Portfolio
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student Portfolio
 
Sathe Academy- Student Portfolio
Sathe Academy- Student PortfolioSathe Academy- Student Portfolio
Sathe Academy- Student Portfolio
 
Onyx sales and services pune Broucher
Onyx sales and services pune BroucherOnyx sales and services pune Broucher
Onyx sales and services pune Broucher
 
Rambert System Elmex Catlog
Rambert System Elmex CatlogRambert System Elmex Catlog
Rambert System Elmex Catlog
 
Rambert System Multispan Catlogue
Rambert System Multispan CatlogueRambert System Multispan Catlogue
Rambert System Multispan Catlogue
 
Jali Designs Vivid Decor
Jali Designs  Vivid DecorJali Designs  Vivid Decor
Jali Designs Vivid Decor
 
Swaraj Roofing Solutions Catalogue
Swaraj Roofing Solutions CatalogueSwaraj Roofing Solutions Catalogue
Swaraj Roofing Solutions Catalogue
 
Shweta m. shewalkar
Shweta m. shewalkarShweta m. shewalkar
Shweta m. shewalkar
 
Sakshi patil
Sakshi patilSakshi patil
Sakshi patil
 
Prajkta karle
Prajkta karlePrajkta karle
Prajkta karle
 
Manuja sutar folio
Manuja sutar folioManuja sutar folio
Manuja sutar folio
 

Dernier

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 

Dernier (20)

Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 

Jupiter physical security ppt 2016 1

  • 1. Physical Security Presented by, Gouriswar Koppada Director JUPITER GROUP OF COMPANIES
  • 2. Security Ethics Security Officer/Supervisor shall: Exhibit exemplary conduct, Respond to employee professional needs, Develop good rapport within the profession, Encourage high standard of officer ethics, Protect Confidential Information, Strive to attain professional competence, Maintain safe and secure work place, Dress to create professionalism & enforce all lawful rules and regulations,
  • 3. What is physical security Physical Security describes security measures that are designed to deny access to unauthorized personnel (including attackers or even accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts. Physical security can be as simple as a locked door or as elaborate as multiple layers of barriers, armed security guards and gate-house placement.
  • 4. Introduction The goal of physical security is to provide a safe environment for all assets and interests of the organization like regulate the entry for men and materials. Physical security provides protection for the HO /CORP/Factory buildings, other building structures, a vehicle housing the system, and/or other business locations..
  • 5. Threats to Physical Environment  Natural/Environmental  Earthquakes, floods, storms, natural fires, extreme temperatures, high humidity, building collapse.  Supply systems:  Communication outage, power distribution, burst pipes.  Man-Made  Explosions, disgruntled employees, unauthorized access, employee errors, sabotage, chemical contamination, Vandalism and theft, intruders, unintentional acts. bombings, terrorist attacks, espionage, civil disturbances, strikes. Note: Suggested for strong Crisis Management Team.
  • 6. Use of available resources Plan and deploy equipment as per site requirement. Check and report suitability of equipment and guards for particular duties. Anticipate risk/threats and take corrective action. Periodically check the operational fitness of security equipment Proper duty roster of shift and give duties to guard as assigned work.
  • 7. Use of available resources continued: Deploy guard with required equipments in required site location. Make procedure to collect intelligence and information. Command and control guard duties and functioning. Maintain key control ,personal control for unit.
  • 9. Duties and responsibilities of security guard To be clearly visible To respond quickly and correctly during crisis Observing and reporting Maintain order among people Receiving guests Offer safety warnings and tips
  • 10. Information Protection Environment A layered defense model COMP4690, HKBU 10 Perimeter Building Grounds Building Entrance Building Floors/Office Suites Offices/Data Centers Equipment/Supplies, Media
  • 11. Organizational structure The organization of security department include the chain of command hierarchy from Executive to front line The purpose of this section is to make clear who reports to whom and who has which responsibility. This give clear understanding of the duties and the responsibilities along with all answers regarding what are the limitation within the position and line authority, responsibilities and accountability.
  • 12. Security Technology and Tools Walls, Fencing, and Gates Guards ID Cards and Badges Locks and Keys CCTV Monitoring Fire Alarms Systems
  • 14. Locks and Keys Two types of locks: mechanical and electro mechanical Locks can also be divided into four categories: manual, programmable, electronic, bio metric Locks fail and alternative procedures for controlling access must be put in place Locks fail in one of two ways  Fail-safe lock  Fail-secure lock
  • 16. Fire Security and Safety Most serious threat to safety of people who work in an organization is possibility of fire. Fires account for more property damage, personal injury, and death than any other threat. Imperative that physical security plans examine and implement strong measures to detect and respond to fires
  • 17. Types of Fire  Types of Fire:  A: Common Combustibles  Elements: Wood products, paper, laminates  Suppression: Water, foam  B: Liquid  Elements: Petroleum products and coolants  Suppression: Gas, CO2, foam, dry powders  C: Electrical  Elements: Electrical equipment and wires  Suppression: Gas, CO2, dry powders  D: Combustible Metals  Elements: magnesium, sodium, potassium  Suppression: Dry powder
  • 18. Different Types of Suppression Agents  Water  Foams  Dry Powders  CO2  Soda Acid
  • 21. Summary Threats to information security that are unique to physical security Key physical security considerations in a facility site Physical security monitoring components Essential elements of access control Fire safety, fire detection, and response Importance of supporting utilities, especially use of uninterrupted power supplies Countermeasures to physical theft of computing devices

Notes de l'éditeur

  1. <number> Introduction Physical security addresses design, implementation, and maintenance of countermeasures that protect the physical resources of an organization. Most of the technology-based controls discussed to this point can be circumvented, if an attacker gains physical access to the devices being controlled. Some computer systems are constructed in such a way that it easy to steal the hard drive and the information it contains. As a result, physical security should receive as much attention as logical security in the security development life cycle.
  2. <number> Seven Major Sources of Physical Loss From Donn B. Parker Extreme temperature: heat, cold Gases: war gases, commercial vapors, humid or dry air, suspended particles Liquids: water, chemicals Living organisms: viruses, bacteria, people, animals, insects Projectiles: tangible objects in motion, powered objects Movement: collapse, shearing, shaking, vibration, liquefaction, flows waves, separation, slide Energy anomalies: electrical surge or failure, magnetism, static electricity, aging circuitry; radiation: sound, light, radio, microwave, electromagnetic, atomic.
  3. <number> Community Roles General management: responsible for the security of the facility in which the organization is housed and the policies and standards for secure operation. IT management and professionals: responsible for environmental and access security in technology equipment locations and for the policies and standards of secure equipment operation. Information security management and professionals: perform risk assessments and implementation reviews for the physical security controls implemented by the other two groups.
  4. <number> Locks and Keys There are two types of locks: mechanical and electro-mechanical. The mechanical lock relies on a key of carefully shaped pieces of metal that turn tumblers to release secured loops of steel, aluminum, or brass (in brass padlocks). The electro-mechanical lock can accept a variety of inputs including keys that are magnetic strips on ID Cards, radio signals from name badges, PINs typed into a keypad. Locks are divided into four categories: manual, programmable, electronic, and biometric. As part of general management’s responsibility for the physical environment, the management of keys and locks is a fundamental concern. Sometimes locks fail and facilities need alternative procedures for access. Locks fail in one of two ways: when the lock of a door fails and the door becomes unlocked, that is a fail-safe lock; when the lock of a door fails and the door remains locked, this is a fail-secure lock.
  5. <number> Electronic Monitoring Used to record events within a specific area or areas where other types of physical controls are not practical. Monitoring frequently uses cameras viewing individuals, while on the other end of these cameras are video cassette recorders and related machinery that captures the video feed. These systems have drawbacks as for the most part they are reactive and do not prevent access or prohibited activity. Recorded monitoring requires an individual to review the information collected.
  6. <number> Fire Safety The most serious threat to physical security and the safety of the people who work in the organization is the possibility of fire. Fires account for more property damage, personal injury, and death than any other threat to physical security. As a result, it is imperative that physical security plans examine and implement strong measures to detect and respond to fires and fire hazards.
  7. <number> Fire Detection Before a fire can be suppressed, it must be detected. Fire detection systems fall into two general categories: manual and automatic. Manual fire detection systems include human responses, such as calling the fire department, as well as manually activated alarms, such as sprinklers and gaseous systems. During the chaos of a fire evacuation, an attacker can easily slip into offices and obtain sensitive information. As part of a complete fire safety program, it is advisable to designate individuals as floor monitors. There are three basic types of fire detection systems: thermal detection, smoke detection, and flame detection. The thermal detection systems contain a sophisticated heat sensor that operates in one of two ways, fixed temperature, and rate-of-rise. Smoke-detection systems are perhaps the most common means of detecting a potentially dangerous fire, and are required by building codes: Smoke detectors operate in one of three ways: 1) photoelectric sensors project and detect an infrared beam, if interrupted activates alarm or suppression systems. 2) ionization sensors contains a small amount of a harmless radioactive material within a detection chamber. When certain by-products of combustion enter, a change in the level of electrical conductivity activates the detector. 3) air-aspirating detectors take in air, filtering it, and moving it through a chamber containing a laser beam. If the laser beam is diverted or refracted by smoke particles, the system is activated. The flame detector is a sensor that detects the infrared or ultraviolet light produced by an open flame. These systems require direct line-of-sight with the flame and compare the flame “signature” to a database to determine whether or not to activate the alarm and suppression systems. While highly sensitive, flame detection systems are expensive and must be installed where they can scan all areas of the protected area.
  8. <number> Fire Detection and Response Fire suppression systems are devices installed and maintained to detect and respond to a fire, potential fire, or combustion situation. These devices typically work to deny an environment of one of the three requirements for a fire to burn: temperature, fuel, and oxygen. Water and water mist systems reduce the temperature of the flame to extinguish it and to saturate some categories of fuels to prevent ignition. Carbon dioxide systems rob fire of its oxygen. Soda acid systems deny fire its fuel, preventing spreading. Gas-based systems disrupt the fire’s chemical reaction but leave enough oxygen for people to survive for a short time.
  9. <number> Fire Suppression Fire suppression systems can consist of portable, manual, or automatic apparatus. Portable extinguishers are rated by the type of fire: Class A: fires of ordinary combustible fuels. Use water and multi-purpose, dry chemical fire extinguishers. Class B: fires fueled by combustible liquids or gases, such as solvents, gasoline, paint, lacquer, and oil. Use carbon dioxide, multi-purpose dry chemical and halon fire extinguishers. Class C: fires with energized electrical equipment or appliances. Use carbon dioxide, multi-purpose, dry chemical and halon fire extinguishers. Class D: fires fueled by combustible metals, such as magnesium, lithium, and sodium. Use special extinguishing agents and techniques. Manual and automatic fire response can include installed systems designed to apply suppressive agents. These are usually either sprinkler or gaseous systems. All sprinkler systems are designed to apply liquid, usually water, to all areas in which a fire has been detected. In sprinkler systems, the organization can implement wet pipe, dry pipe, or pre-action systems. Water mist sprinklers are the newest form of sprinkler systems and rely on micro-fine mists instead of traditional shower-type systems.